{"uuid": "fffbc323-9c11-4dbc-91e7-623c3bd3d6f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38030", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4931", "content": "#exploit\n1. CVE-2024-38030:\nWindows Themes Files Spoofing\nhttps://blog.0patch.com/2024/10/we-patched-cve-2024-38030-found-another.html\n\n2. CVE-2024-9533:\nD-Link DIR-605L buffer overflow\nhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formDeviceReboot.md\n\n3. CVE-2024-45844:\nPrivilege escalation in F5 BIG-IP\nhttps://offsec.almond.consulting/privilege-escalation-f5-CVE-2024-45844.html\n]-&gt; An implementation of F5's \"mcp\" protocol, including MitM tooling to sniff traffic while vuln hunting", "creation_timestamp": "2024-10-31T19:21:46.000000Z"}